Paul and Paul (and the WG), > >> Primarily because that is only of value to resolvers that are validating, >> and that's the small minority of resolvers. >
Whats “a resolver”? Is Google’s DNS service one resolver or hundreds? Of Cloudflare’s 1.1.1.1 farm? What about Chinanet’s service where thousands of IP addresses all act in remarkably similar ways? Frankly, any statement about “the majority of” or “the minority of” resolvers is a pretty meaningless statement from such a perspective. Is my recursive resolver at home that answers queries for just me equal in any way to Google’s service which is used by one quarter of the Internet’s users? Yeah they are both resolvers, but thats about it. > > Which of large resolver operators is not validating ? well we have a good idea of the answer to that question: Open DNS resolvers that do not perform DNSSEC validation: 114dns (VERY large in China) dnspai (again, big in China) onedns opendns (some instances of Opendns’s cloud, but by no means the entirety) > Which of the stock opensource resolvers is not validating with a default > configuration ? I believe there are a few that require the local admin to enable it and the distro has it disabled by default. > > Arguably the only ones left not validating are phones and we are busy giving > them DoH and DoT to servers that do that for them. um, not really. In the US the ISP resolvers that don't validate include AT&T, Cellco, T-Mobile, UUNET, Charter,... It's probably easier to list the major ISPs in the US that do DNSSEC validate : Comcast. In Canada the ISPs resolver systems that don't include BACOM, Rogers, Shaw,… Further afield, some of the extremely large ISP resolvers in India validate (Reliance Jio), but in China, not. > > I think your argument does not hold. I find it hard to agree with either assertion about the prevalence of use of DNSSEC validation here. The argument that DNSSEC is just a minority corner case does not hold water these days - 25% of the world’s users pass their queries through DNSSEC validating resolvers and will not get an answer if the validation fails. A further 10% of users also use DNSSEC validation and then fail over to non-validating resolvers in the event of validation failure. 1/3 of the total user base of today’s Internet use DNS recursive resolvers that perform DNSSEC validation. Thats not a small minority. There is a lot of DNSSEC validation out there for users and a lot of large resolver systems serving these users. But 2/3 of users do not use DNSSEC validating resolvers. So it's by means the default case for the DNS. But DNSSEC validation continues an upward trend and given the standard lifetime of IETF work (2 years and 17 days on average for a draft these days) then the numbers for DNSSEC use will only grow. Accordingly, I have far more sympathy with Paul Wouter’s assertion that bringing in yet another mechanism of opportunistic encryption is one more straw-like adornment to the DNS camel (to use my own interpretation of Paul W’s comments) while a TLSA record could perform the same role, obviating the need for opportunistic encryption to authoritative servers. regards, Geoff _______________________________________________ dns-privacy mailing list [email protected] https://www.ietf.org/mailman/listinfo/dns-privacy
